• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
Citation: Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470

Survey of Internet of Things Security

More Information
  • Published Date: September 30, 2017
  • With the development of smart home, intelligent care and smart car, the application fields of IoT are becoming more and more widespread, and its security and privacy receive more attention by researchers. Currently, the related research on the security of the IoT is still in its initial stage, and most of the research results cannot solve the major security problem in the development of the IoT well. In this paper, we firstly introduce the three-layer logic architecture of the IoT, and outline the security problems and research priorities of each level. Then we discuss the security issues such as privacy preserving and intrusion detection, which need special attention in the IoT main application scenarios (smart home, intelligent healthcare, car networking, smart grid, and other industrial infrastructure). Though synthesizing and analyzing the deficiency of existing research and the causes of security problem, we point out five major technical challenges in IoT security. They are privacy protection in data sharing, the equipment security protection under limited resources, more effective intrusion detection and defense systems and method, access control of equipment automation operations and cross-domain authentication of motive device. We finally detail every technical challenge and point out the IoT security research hotspots in future.
  • Related Articles

    [1]Xue Xin, Zhu Tianchen, Sun Qingyun, Zhou Haoyi, Li Jianxin. Efficient Subgraph Matching Algorithm with Graph Neural Network[J]. Journal of Computer Research and Development, 2025, 62(3): 694-708. DOI: 10.7544/issn1000-1239.202330732
    [2]Shang Jing, Wu Zhihui, Xiao Zhiwen, Zhang Yifei. Graph4Cache: A Graph Neural Network Model for Cache Prefetching[J]. Journal of Computer Research and Development, 2024, 61(8): 1945-1956. DOI: 10.7544/issn1000-1239.202440190
    [3]Zhang Tianming, Xu Yiheng, Cai Xinwei, Fan Jing. A Shortest Path Query Method over Temporal Graphs[J]. Journal of Computer Research and Development, 2022, 59(2): 362-375. DOI: 10.7544/issn1000-1239.20210893
    [4]Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846
    [6]Lu Jianhua, Zhang Baili, Jiang Shan, Lu Ningyun, Wang Feifei. Selection-Verification-Filtering: An Iterative Subgraph Containment Query Processing Strategy[J]. Journal of Computer Research and Development, 2012, 49(10): 2221-2228.
    [7]Ou Xiaoping, Wang Chaokun, Peng Zhuo, Qiu Ping, and Bai Yiyuan. A Graph-Based Music Data Model and Query Language[J]. Journal of Computer Research and Development, 2011, 48(10): 1879-1889.
    [8]Zhang Xu, He Xiangnan, Jin Cheqing, and Zhou Aoying. Processing k-Nearest Neighbors Query over Uncertain Graphs[J]. Journal of Computer Research and Development, 2011, 48(10): 1871-1878.
    [9]Zhang Lin, Zhang Li. Software Superfamilies Based on Sub-Graph Significance Profile[J]. Journal of Computer Research and Development, 2011, 48(2): 251-258.
    [10]Li Zhoujun, Chen Yiming, Liu Junwan, Chen Huowang. A Survey of Computational Method in Protein-Protein Interaction Research[J]. Journal of Computer Research and Development, 2008, 45(12): 2129-2137.

Catalog

    Article views (5697) PDF downloads (5037) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return